“We welcome EyeLock as a certified partner and look forward to a long relationship where we can provide state-of-the-art iris-biometric technology to our customers demanding a more secure environment,” said AMAG Technology, Vice President of Product Marketing, Dave Ella.

“We are excited to be a part of AMAG’s Symmetry Preferred Partner Program,” said Anthony Antolino, Chief Marketing and Business Development officer at EyeLock. “The integration of EyeLock’s technology with AMAG’s Symmetry Access Control system will help accelerate the adoption of EyeLock’s product offering by simplifying the implementation of iris biometrics across access control environments.”

EyeLock’s nano NXT integrates with Symmetry Access Control through EyeLock’s Identity Suite (EIS), and can serve as part of a single factor or two-factor authentication process. The combination of EIS and Symmetry has made it possible to enable and significantly accelerate the onboarding of iris-based identity authentication technology. The Eyelock software synchronizes with existing employee identities using the Symmetry XML Open Integration module, and when the system is in operation nano NXT communicates directly with Symmetry door controllers for a fast and secure solution.

The nano NXT authenticates up to 20 people per minute, in-motion and at-a-distance with unparalleled accuracy. nano NXT can be used in a variety of environments including commercial/enterprise, corrections, data centers, education, financial services, government, healthcare facilities and hospitality.

EyeLock LLC is a market leader of iris-based identity authentication solutions. EyeLock’s technology provides an unprecedented level of convenience and security with unmatched biometric accuracy, making it the most proven way to authenticate identity aside from DNA. EyeLock’s proprietary iris authentication technology looks at more than 240 unique iris characteristics and provides a fast, user-friendly experience. EyeLock is one of the only biometric companies in the world to own and control the entire software and algorithm stack, providing dual-eye authentication, an unmatched security architecture and anti-spoofing technology.